Analysis
-
max time kernel
24s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 05:00
Static task
static1
Behavioral task
behavioral1
Sample
79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe
Resource
win10v2004-20220812-en
General
-
Target
79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe
-
Size
1.3MB
-
MD5
fe3d769e817b657243ac5d221cc56cac
-
SHA1
978d8aefb4774890110d81e61b2bb82e8c42f175
-
SHA256
79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80
-
SHA512
f26a0a705005eac9f17c24b176e89c3667b047509051d5b2a118c91050917e122c67eb942f2dd8ef40c19683ddccffb53437d41dbc1746d2f291e1f727f302fb
-
SSDEEP
24576:rtL9JBGGoaqcxcvk/S6ojVKKS8Raa4PiB36PES5AjDhmwjAE4m9BE4Ye4:RL9JwGoaqcuvk6xVA8RaaUiBj/LH4H4+
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 4564 B820A2.EXE 1156 B820A2.EXE 1676 B820A2.EXE 1176 B820A2.EXE 3424 B820A2.EXE 2520 B820A2.EXE 1880 B820A2.EXE 1876 B820A2.EXE 4728 B820A2.EXE 1972 B820A2.EXE 4228 B820A2.EXE 3844 B820A2.EXE 4984 B820A2.EXE 4376 B820A2.EXE 4780 B820A2.EXE 4460 B820A2.EXE 2312 explorer.exe 1396 explorer.exe 3596 B820A2.EXE 2440 B820A2.EXE 1116 B820A2.EXE 4696 B820A2.EXE -
Loads dropped DLL 64 IoCs
pid Process 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4564 B820A2.EXE 4564 B820A2.EXE 4564 B820A2.EXE 4564 B820A2.EXE 4564 B820A2.EXE 4564 B820A2.EXE 4564 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 1676 B820A2.EXE 1676 B820A2.EXE 1676 B820A2.EXE 1676 B820A2.EXE 1676 B820A2.EXE 1676 B820A2.EXE 1676 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 3424 B820A2.EXE 3424 B820A2.EXE 3424 B820A2.EXE 3424 B820A2.EXE 3424 B820A2.EXE 3424 B820A2.EXE 3424 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 1880 B820A2.EXE 1880 B820A2.EXE 1880 B820A2.EXE 1880 B820A2.EXE 1880 B820A2.EXE 1880 B820A2.EXE 1880 B820A2.EXE 1876 B820A2.EXE 1876 B820A2.EXE 1876 B820A2.EXE 1876 B820A2.EXE 1876 B820A2.EXE 1876 B820A2.EXE 1876 B820A2.EXE 4728 B820A2.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 22 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 explorer.exe File opened for modification \??\PhysicalDrive0 explorer.exe File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE File opened for modification \??\PhysicalDrive0 B820A2.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ explorer.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ explorer.exe File opened for modification C:\Windows\SysWOW64\3CA4E3\ 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ explorer.exe File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ explorer.exe File opened for modification C:\Windows\SysWOW64\B3A6A3\ explorer.exe File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ explorer.exe File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\D42343\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\3CA4E3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE File created C:\Windows\SysWOW64\B3A6A3\B820A2.EXE B820A2.EXE File opened for modification C:\Windows\SysWOW64\B5A29B\ B820A2.EXE File opened for modification C:\Windows\SysWOW64\B3A6A3\ B820A2.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: AddClipboardFormatListener 18 IoCs
pid Process 4392 explorer.exe 1044 explorer.exe 996 explorer.exe 3664 explorer.exe 1416 explorer.exe 2908 explorer.exe 3600 explorer.exe 4168 explorer.exe 2172 explorer.exe 5032 explorer.exe 4084 explorer.exe 5116 explorer.exe 3984 explorer.exe 1952 explorer.exe 404 explorer.exe 5012 explorer.exe 2040 explorer.exe 2828 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 4564 B820A2.EXE 4564 B820A2.EXE 4564 B820A2.EXE 4564 B820A2.EXE 4564 B820A2.EXE 4564 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 1156 B820A2.EXE 4392 explorer.exe 4392 explorer.exe 1044 explorer.exe 1044 explorer.exe 1676 B820A2.EXE 1676 B820A2.EXE 1676 B820A2.EXE 1676 B820A2.EXE 1676 B820A2.EXE 1676 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 1176 B820A2.EXE 996 explorer.exe 996 explorer.exe 3424 B820A2.EXE 3424 B820A2.EXE 3424 B820A2.EXE 3424 B820A2.EXE 3424 B820A2.EXE 3424 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 2520 B820A2.EXE 3664 explorer.exe 3664 explorer.exe 1416 explorer.exe 1416 explorer.exe 1880 B820A2.EXE 1880 B820A2.EXE 1880 B820A2.EXE 1880 B820A2.EXE 1880 B820A2.EXE 1880 B820A2.EXE 2908 explorer.exe 2908 explorer.exe 1876 B820A2.EXE 1876 B820A2.EXE 1876 B820A2.EXE 1876 B820A2.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2528 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 81 PID 4696 wrote to memory of 2528 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 81 PID 4696 wrote to memory of 2528 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 81 PID 4696 wrote to memory of 4564 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 83 PID 4696 wrote to memory of 4564 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 83 PID 4696 wrote to memory of 4564 4696 79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe 83 PID 4564 wrote to memory of 1368 4564 B820A2.EXE 84 PID 4564 wrote to memory of 1368 4564 B820A2.EXE 84 PID 4564 wrote to memory of 1368 4564 B820A2.EXE 84 PID 4564 wrote to memory of 1156 4564 B820A2.EXE 85 PID 4564 wrote to memory of 1156 4564 B820A2.EXE 85 PID 4564 wrote to memory of 1156 4564 B820A2.EXE 85 PID 1156 wrote to memory of 1452 1156 B820A2.EXE 87 PID 1156 wrote to memory of 1452 1156 B820A2.EXE 87 PID 1156 wrote to memory of 1452 1156 B820A2.EXE 87 PID 1156 wrote to memory of 1676 1156 B820A2.EXE 88 PID 1156 wrote to memory of 1676 1156 B820A2.EXE 88 PID 1156 wrote to memory of 1676 1156 B820A2.EXE 88 PID 1676 wrote to memory of 3100 1676 B820A2.EXE 90 PID 1676 wrote to memory of 3100 1676 B820A2.EXE 90 PID 1676 wrote to memory of 3100 1676 B820A2.EXE 90 PID 1676 wrote to memory of 1176 1676 B820A2.EXE 91 PID 1676 wrote to memory of 1176 1676 B820A2.EXE 91 PID 1676 wrote to memory of 1176 1676 B820A2.EXE 91 PID 1176 wrote to memory of 5048 1176 B820A2.EXE 93 PID 1176 wrote to memory of 5048 1176 B820A2.EXE 93 PID 1176 wrote to memory of 5048 1176 B820A2.EXE 93 PID 1176 wrote to memory of 3424 1176 B820A2.EXE 95 PID 1176 wrote to memory of 3424 1176 B820A2.EXE 95 PID 1176 wrote to memory of 3424 1176 B820A2.EXE 95 PID 3424 wrote to memory of 4540 3424 B820A2.EXE 96 PID 3424 wrote to memory of 4540 3424 B820A2.EXE 96 PID 3424 wrote to memory of 4540 3424 B820A2.EXE 96 PID 3424 wrote to memory of 2520 3424 B820A2.EXE 97 PID 3424 wrote to memory of 2520 3424 B820A2.EXE 97 PID 3424 wrote to memory of 2520 3424 B820A2.EXE 97 PID 2520 wrote to memory of 3608 2520 B820A2.EXE 99 PID 2520 wrote to memory of 3608 2520 B820A2.EXE 99 PID 2520 wrote to memory of 3608 2520 B820A2.EXE 99 PID 2520 wrote to memory of 1880 2520 B820A2.EXE 100 PID 2520 wrote to memory of 1880 2520 B820A2.EXE 100 PID 2520 wrote to memory of 1880 2520 B820A2.EXE 100 PID 1880 wrote to memory of 3376 1880 B820A2.EXE 102 PID 1880 wrote to memory of 3376 1880 B820A2.EXE 102 PID 1880 wrote to memory of 3376 1880 B820A2.EXE 102 PID 1880 wrote to memory of 1876 1880 B820A2.EXE 103 PID 1880 wrote to memory of 1876 1880 B820A2.EXE 103 PID 1880 wrote to memory of 1876 1880 B820A2.EXE 103 PID 1876 wrote to memory of 2440 1876 B820A2.EXE 139 PID 1876 wrote to memory of 2440 1876 B820A2.EXE 139 PID 1876 wrote to memory of 2440 1876 B820A2.EXE 139 PID 1876 wrote to memory of 4728 1876 B820A2.EXE 107 PID 1876 wrote to memory of 4728 1876 B820A2.EXE 107 PID 1876 wrote to memory of 4728 1876 B820A2.EXE 107 PID 4728 wrote to memory of 4188 4728 B820A2.EXE 108 PID 4728 wrote to memory of 4188 4728 B820A2.EXE 108 PID 4728 wrote to memory of 4188 4728 B820A2.EXE 108 PID 4728 wrote to memory of 1972 4728 B820A2.EXE 109 PID 4728 wrote to memory of 1972 4728 B820A2.EXE 109 PID 4728 wrote to memory of 1972 4728 B820A2.EXE 109 PID 1972 wrote to memory of 4916 1972 B820A2.EXE 111 PID 1972 wrote to memory of 4916 1972 B820A2.EXE 111 PID 1972 wrote to memory of 4916 1972 B820A2.EXE 111 PID 1972 wrote to memory of 4228 1972 B820A2.EXE 173
Processes
-
C:\Users\Admin\AppData\Local\Temp\79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe"C:\Users\Admin\AppData\Local\Temp\79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d80.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\79eae9470508cb945401b0cadf28d40dcd59245076a6ae9f2c8c6ef7e49b3d802⤵PID:2528
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A23⤵PID:1368
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A24⤵PID:1452
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A25⤵PID:3100
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A26⤵PID:5048
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A27⤵PID:4540
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A28⤵PID:3608
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A29⤵PID:3376
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A210⤵PID:2440
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A211⤵PID:4188
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE11⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A212⤵PID:4916
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE12⤵PID:4228
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A213⤵PID:4912
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE13⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:3844 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A214⤵PID:2448
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE14⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4984 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A215⤵PID:116
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4376 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A216⤵PID:64
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE16⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4780 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A217⤵PID:4496
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE17⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4460 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A218⤵PID:2280
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE18⤵PID:2312
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A219⤵PID:3956
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE19⤵PID:1396
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A220⤵PID:1600
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE20⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:3596 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A221⤵PID:652
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE21⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A222⤵PID:2168
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE22⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1116 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A223⤵PID:1904
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE23⤵
- Executes dropped EXE
PID:4696 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A224⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2312
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE24⤵PID:2168
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A225⤵PID:488
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE25⤵PID:3872
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A226⤵PID:5204
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE26⤵PID:5236
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A227⤵PID:5324
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE27⤵PID:5360
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A228⤵PID:5564
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE28⤵PID:5604
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A229⤵PID:5668
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE29⤵PID:5704
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A230⤵PID:5788
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE30⤵PID:5852
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A231⤵PID:5932
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE31⤵PID:5996
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A232⤵PID:6100
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE32⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:4228 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A233⤵PID:5164
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE33⤵PID:5220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A234⤵PID:5472
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE34⤵PID:5248
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A235⤵PID:5568
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE35⤵PID:5696
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A236⤵PID:5968
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE36⤵PID:5816
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A237⤵PID:5936
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE37⤵PID:3616
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A238⤵PID:5704
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE38⤵PID:5164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A239⤵PID:5744
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE39⤵PID:3256
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A240⤵PID:5824
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE40⤵PID:5584
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A241⤵PID:5448
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE41⤵PID:6008
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A242⤵PID:1524
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE42⤵PID:5824
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A243⤵PID:6192
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE43⤵PID:6248
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A244⤵PID:6360
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE44⤵PID:6428
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A245⤵PID:6520
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE45⤵PID:6624
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A246⤵PID:6724
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE46⤵PID:6776
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A247⤵PID:6868
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE47⤵PID:6920
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A248⤵PID:7020
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE48⤵PID:7056
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A249⤵PID:7132
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE49⤵PID:5692
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A250⤵PID:1336
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE50⤵PID:6420
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A251⤵PID:5608
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE51⤵PID:6524
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A252⤵PID:6728
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE52⤵PID:3272
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A253⤵PID:7036
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE53⤵PID:3508
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A254⤵PID:6620
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE54⤵PID:6604
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A255⤵PID:6564
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE55⤵PID:5304
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A256⤵PID:7164
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE56⤵PID:6576
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A257⤵PID:6660
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE57⤵PID:5448
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A258⤵PID:7192
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE58⤵PID:7260
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A259⤵PID:7320
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE59⤵PID:7372
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A260⤵PID:7440
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE60⤵PID:7560
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A261⤵PID:7672
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE61⤵PID:7720
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A262⤵PID:8096
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE62⤵PID:8124
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A263⤵PID:8188
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE63⤵PID:6604
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A264⤵PID:6872
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE64⤵PID:7436
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A265⤵PID:7520
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE65⤵PID:7352
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A266⤵PID:7444
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE66⤵PID:2800
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A267⤵PID:7880
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE67⤵PID:7604
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A268⤵PID:8112
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE68⤵PID:3748
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A269⤵PID:7804
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE69⤵PID:8144
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A270⤵PID:2476
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE70⤵PID:7880
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A271⤵PID:1256
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE71⤵PID:3268
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A272⤵PID:3312
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE72⤵PID:7436
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A273⤵PID:8240
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE73⤵PID:8272
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A274⤵PID:8352
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE74⤵PID:8400
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A275⤵PID:8480
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE75⤵PID:8516
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A276⤵PID:8576
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE76⤵PID:8616
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A277⤵PID:8940
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE77⤵PID:9004
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A278⤵PID:9148
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE78⤵PID:9212
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A279⤵PID:6604
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE79⤵PID:8724
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A280⤵PID:8276
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE80⤵PID:8604
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A281⤵PID:8400
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE81⤵PID:5736
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A282⤵PID:9204
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE82⤵PID:8648
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A283⤵PID:3316
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE83⤵PID:5688
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A284⤵PID:8076
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE84⤵PID:3108
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A285⤵PID:8376
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE85⤵PID:1472
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A286⤵PID:8392
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE86⤵PID:8468
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A287⤵PID:6308
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE87⤵PID:8620
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A288⤵PID:6248
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE88⤵PID:6632
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A289⤵PID:3592
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE89⤵PID:784
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A290⤵PID:8516
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE90⤵PID:9232
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A291⤵PID:9496
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE91⤵PID:9524
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A292⤵PID:9604
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE92⤵PID:9632
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A293⤵PID:9776
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE93⤵PID:9832
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A294⤵PID:9952
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE94⤵PID:9992
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A295⤵PID:10096
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE95⤵PID:10124
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A296⤵PID:10188
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE96⤵PID:9000
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A297⤵PID:3012
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE97⤵PID:6248
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A298⤵PID:9512
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE98⤵PID:7976
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A299⤵PID:9764
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE99⤵PID:9828
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2100⤵PID:9944
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE100⤵PID:9692
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2101⤵PID:9836
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE101⤵PID:10236
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2102⤵PID:10172
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE102⤵PID:7940
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2103⤵PID:9660
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE103⤵PID:5728
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2104⤵PID:9728
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE104⤵PID:4836
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2105⤵PID:8808
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE105⤵PID:9832
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2106⤵PID:5248
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE106⤵PID:5260
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2107⤵PID:6276
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE107⤵PID:5732
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2108⤵PID:8480
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE108⤵PID:6316
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2109⤵PID:8524
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE109⤵PID:6948
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2110⤵PID:6276
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE110⤵PID:7368
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2111⤵PID:4196
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE111⤵PID:9220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2112⤵PID:8524
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE112⤵PID:5920
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2113⤵PID:10276
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE113⤵PID:10344
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2114⤵PID:10424
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE114⤵PID:10504
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2115⤵PID:10588
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE115⤵PID:10696
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2116⤵PID:10928
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE116⤵PID:10960
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2117⤵PID:11048
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE117⤵PID:11080
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2118⤵PID:11156
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE118⤵PID:11200
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2119⤵PID:3628
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE119⤵PID:5852
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2120⤵PID:9788
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE120⤵PID:7580
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2121⤵PID:10724
-
-
C:\Windows\SysWOW64\B3A6A3\B820A2.EXEC:\Windows\system32\B3A6A3\B820A2.EXE121⤵PID:4300
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\B3A6A3\B820A2122⤵PID:7504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-